theinfosecnews
CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634
Allvulnerability71malware15policy14breach5apt4ransomware1
Ppolicy

Microsoft Mandates Windows 11 25H2 Upgrade for Unmanaged Home and Pro Devices

Microsoft has begun force-upgrading unmanaged Windows 11 24H2 Home and Pro devices to version 25H2 to address critical vulnerabilities including CVE-2023-28252. Unmanaged devices not enrolled in enterprise management tools will be automatically updated starting June 2024. Organizations should audit unmanaged endpoints and enforce patch management to maintain security compliance.

BleepingComputer·7h ago·2 min read
Ppolicy

RSAC 2026: AI-Driven Threats, Global Cyber Leadership Shifts, and the Policies Reshaping Defense Priorities

RSAC 2026 surfaced AI-assisted attack tooling, enforcement of EU NIS2 and the incoming EU AI Act, and structural shifts in U.S. and allied cyber leadership as the defining issues for security practitioners. SOC teams and CISOs face active NIS2 enforcement since October 2024, EU AI Act high-risk system deadlines in August 2026, and ongoing CISA KEV remediation obligations. Organizations must audit AI product compliance, validate vulnerability remediation workflows, and document NIS2 risk management measures now.

Dark Reading·17h ago·4 min read
Ppolicy

SEC Cybersecurity Disclosure Rule: What CISOs and Security Engineers Must Do Before the Deadlines Hit

The SEC's cybersecurity disclosure rule requires public companies to report material incidents on Form 8-K within four business days of a materiality determination, and to disclose risk management programs and board oversight annually in 10-K filings. Large accelerated filers have been subject to incident reporting requirements since December 18, 2023, with enforcement precedent already set through the SEC's fraud charges against SolarWinds and CISO Timothy Brown. Security teams must build materiality determination workflows, align IR playbooks to disclosure triggers, and ensure 10-K disclosures accurately reflect internal security posture.

Dark Reading·19h ago·4 min read
Ppolicy

FCC Mandates Pre-Approval for All Foreign-Manufactured Routers Imported or Sold in the US

The FCC now requires pre-approval for all foreign-manufactured routers before they can be imported, marketed, or sold in the United States, with applicants required to disclose foreign investor relationships and submit a U.S. manufacturing relocation plan. The rule targets supply chain risks tied to documented exploitation campaigns by groups including Volt Typhoon and Salt Typhoon, which compromised SOHO and enterprise routers to gain persistent access to U.S. critical infrastructure. CISOs, procurement teams, and network engineers must audit hardware pipelines, monitor DoD and DHS exemption lists, and pressure vendors for compliance timelines now.

Schneier on Security·21h ago·4 min read
Ppolicy

Trump's 2026 Cyber Strategy Hints at Authorizing Private Sector Hackback Operations

The White House's 2026 Cyber Strategy for America contains language suggesting the administration may authorize private companies to conduct offensive operations against adversary networks. No implementing guidance or statutory change has followed, meaning the Computer Fraud and Abuse Act remains the operative legal constraint. Security teams should not treat the strategy document as legal authorization and should review their active defense practices against current law.

Schneier on Security·1d ago·4 min read
Ppolicy

Reality Pentesting: A Technical Framework for Modeling Cognitive Exploits Against Human Perception Systems

Researcher K. Melton has published a cognitive security framework called Reality Pentesting, which maps human perception and decision-making to IT security primitives including attack surfaces, bypass mechanisms, and exploit layers. The most operationally critical element is the NeuroCompiler — the pre-conscious signal interpretation layer that adversaries target in phishing, vishing, and BEC campaigns before deliberate evaluation can occur. Security teams running awareness programs, red team engagements, and insider threat models should apply this taxonomy to identify gaps in controls that only address conscious, deliberate reasoning.

Schneier on Security·2d ago·4 min read
Ppolicy

Black Duck CEO: AI Is Rewriting the Rules of Application Security Testing

Black Duck CEO Jason Schmitt argues that AI-assisted development tools like GitHub Copilot and Amazon CodeWhisperer are introducing vulnerability patterns and dependency risks that traditional SAST and SCA pipelines are not equipped to detect. Existing regulations including NIST SSDF, OMB M-22-18, and PCI DSS v4.0 create direct compliance exposure for organizations that have not updated their application security testing programs to account for LLM-generated code. Security teams must audit AI tool usage across the SDLC, update SBOM generation, and revise secure coding policies before their next compliance attestation cycle.

Dark Reading·3d ago·4 min read
Ppolicy

Trump’s 2025 Executive Order Blocks State AI Regulation, Reshaping U.S. Political Landscape

The Trump administration's December 2025 executive order blocks states from regulating AI by threatening legal action and withholding funds, favoring big tech interests over voter preferences. This action disrupts traditional political alignments, fuels local opposition to AI data centers, and sets the stage for AI regulation as a key issue in upcoming midterm elections.

Schneier on Security·8d ago·3 min read
Ppolicy

Sen. Wyden Flags Classified Section 702 Abuse Ahead of Reauthorization Deadline

Sen. Ron Wyden warned on March 12, 2026, that a classified legal interpretation of Section 702 FISA authority has been withheld from Congress during multiple reauthorization votes, and that public disclosure will reveal surveillance practices broader than currently understood. The warning comes directly ahead of Section 702's April 2026 reauthorization deadline. Security teams should audit data residency, monitor vendor transparency reports, and treat Section 702's legal scope as an unresolved variable in cloud vendor risk assessments.

Schneier on Security·9d ago·4 min read